Abstract
Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making it suitable for cloud or edge systems involving resource-constrained devices. There is no fully outsourced and fully verifiable attribute-based encryption scheme or key-policy VO-ABE scheme. Moreover, the previous VO-ABE schemes require multiple rounds of interaction or high verification costs to support verifiable outsourced key generation and verifiable outsourced encryption. To address these issues, in this paper, we propose an effective key-policy fully outsourced and fully verifiable attribute-based encryption scheme supporting verifiable outsourced key generation, encryption, and decryption simultaneously. We formally define two new properties: outsourced key generation verifiability and outsourced encryption verifiability. Analysis and simulation show that the proposed scheme performs well and is practical. All local computational overheads of the proposed scheme are constant and do not increase with the number of attributes or the complexity of access structures.








Similar content being viewed by others
Data availability
No datasets were generated or analysed during the current study.
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pp. 457–473. Springer (2005)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334. IEEE (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Dario, C., Nelly, F., Rosario, G., Antonio, N. (eds.) International Workshop on Public Key Cryptography, pp. 53–70. Springer (2011)
Rouselakis, Y., Waters, B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM (2013)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: 20th USENIX Security Symposium (USENIX Security 11) (2011)
Wahaballa, A., Qin, Z., Abdalla, H., Abdellatief, M., Elfaki, M.A.: Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system. Trans. Emerging Telecommun. Technol. 33(5), 3870 (2022)
Ge, C., Liu, Z., Susilo, W., Fang, L., Wang, H.: Attribute-based encryption with reliable outsourced decryption in cloud computing using smart contract. IEEE Transactions on Dependable and Secure Computing, IEEE (2023)
Zhou, Z., Huang, D.: Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th International Conference on Network and Service Management (cnsm) and 2012 Workshop on Systems Virtualiztion Management (svm), pp. 37–45. IEEE (2012)
Li, J., Chen, X., Li, J., Jia, C., Ma, J., Lou, W.: Fine-grained access control system based on outsourced attribute-based encryption. In: Jason, C., Sushil, J., Keith, M. (eds.) Computer Security–ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings 18, pp. 592–609. Springer (2013)
Zhang, R., Ma, H., Lu, Y.: Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125, 344–353 (2017)
Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Info. Forensics Security 8(8), 1343–1354 (2013)
Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Info. Forensics Secur. 10(10), 2119–2130 (2015)
Hahn, C., Kwon, H., Hur, J.: Trustworthy delegation toward securing mobile healthcare cyber-physical systems. IEEE Internet Thing J. 6(4), 6301–6309 (2018)
Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Info. Forensics Security 10(7), 1384–1393 (2015)
Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Dependable Secure Comput. 13(5), 533–546 (2015)
Li, J., Wang, Y., Zhang, Y., Han, J.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478–487 (2017)
Li, J., Sha, F., Zhang, Y., Huang, X., Shen, J.: Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Security Commun. Netw. 2017, 1–11 (2017)
Islam, M.A., Madria, S.K.: Attribute-based encryption scheme for secure multi-group data sharing in cloud. IEEE Trans. Services Comput. 15(4), 2158–2172 (2020)
Hahn, C., Kim, J.: Verifiable outsourced decryption of encrypted data from heterogeneous trust networks. IEEE Internet Things J. 9(22), 22559–22570 (2022)
Liu, S., Yu, J., Hu, C., Li, M.: Traceable multiauthority attribute-based encryption with outsourced decryption and hidden policy for CIoT. Wireless Commun. Mobile Comput. 2021, 1–16 (2021)
Xie, C., Shi, R.H., Zhang, X., Wang, P., Guo, W.: Verifiable outsourcing EMRs scheme with attribute-based encryption in cloud-edge environments. J Info Security Appl 76, 103526 (2023)
Ma, H., Zhang, R., Wan, Z., Lu, Y., Lin, S.: Verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing. IEEE Trans. Dependable Secure Comput 14(6), 679–692 (2015)
Xiong, H., Sun, J.: Comments on “verifiable and exculpable outsourced attribute-based encryption for access control in cloud computing.” IEEE Trans. Dependable Secure Comput. 14(4), 461–462 (2017)
Li, Z., Li, W., Jin, Z., Zhang, H., Wen, Q.: An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access 7, 29023–29037 (2019)
Premkamal, P.K., Pasupuleti, S.K., Alphonse, P.: A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud. J. Ambient Intell. Human. Comput. 10, 2693–2707 (2019)
Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2013)
Wang, H., He, D., Shen, J., Zheng, Z., Zhao, C., Zhao, M.: Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21, 7325–7335 (2017)
Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003. Proceedings 23, pp. 565–582. Springer (2023)
Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: Advances in Cryptology–EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31–June 4, 1998 Proceedings 17, pp. 236–250. Springer (1998)
Acknowledgements
This work was supported by the National Social Science Fund of China under Grant No.21XTQ015. The authors thank the anonymous reviewers for their detailed review and constructive comments.
Funding
Funding was provided by the National Social Science Fund of China (Grant No. 21XTQ015).
Author information
Authors and Affiliations
Contributions
XZ: Data curation, Formal analysis, Software, Writing-Original draft preparation. ZH: Conceptualization, Methodology, Writing-Reviewing and Editing, Supervision.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhao, X., Huang, Z. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing. Cluster Comput 27, 10437–10453 (2024). https://doi.org/10.1007/s10586-024-04423-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-024-04423-5